Close Menu
globalcrimedesk.comglobalcrimedesk.com
    What's Hot

    BBC joins injured Gazan children as they arrive in Jordan

    Ransomware gangs join ongoing SAP NetWeaver attacks

    Even the Face of Georgia’s Medicaid Experiment Couldn’t Escape its Red Tape — ProPublica

    Facebook X (Twitter) Instagram
    Trending
    • BBC joins injured Gazan children as they arrive in Jordan
    • Ransomware gangs join ongoing SAP NetWeaver attacks
    • Even the Face of Georgia’s Medicaid Experiment Couldn’t Escape its Red Tape — ProPublica
    • Meet your new colleague – the Machine Learning Admin • The Register
    • Military colonel reacts to transgender military ban : NPR
    • Turkey’s Middle-Power Dilemma | Foreign Affairs
    • Pubs to stay open late if England or Wales reach semi-final
    • Why Disinformation Surged During the India-Pakistan Crisis – Foreign Policy
    Facebook X (Twitter) Instagram
    globalcrimedesk.comglobalcrimedesk.com
    • Home
    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention
    • Scandals
    • Terror
    • Trafficking
    globalcrimedesk.comglobalcrimedesk.com
    Home»Cyber»Cisco fixes max severity IOS XE flaw letting attackers hijack devices
    Cyber

    Cisco fixes max severity IOS XE flaw letting attackers hijack devices

    mediamillion1000@gmail.comBy [email protected]May 11, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
    Follow Us
    Google News Flipboard
    Cisco fixes max severity IOS XE flaw letting attackers hijack devices
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Cisco fixes max severity IOS XE flaw letting attackers hijack devices

    Cisco has fixed a maximum severity flaw in IOS XE Software for Wireless LAN Controllers by a hard-coded JSON Web Token (JWT) that allows an unauthenticated remote attacker to take over devices.

    This token is meant to authenticate requests to a feature called ‘Out-of-Band AP Image Download.’ Since it’s hard-coded, anyone can impersonate an authorized user without credentials.

    The vulnerability is tracked as CVE-2025-20188 and has a maximum 10.0 CVSS score, allowing threat actors to fully compromise devices according to the vendor.

    “An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP image download interface,” reads Cisco’s bulletin.

    “A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.”

    It is noted that CVE-2025-20188 is only exploitable when the ‘Out-of-Band AP Image Download’ feature is enabled on the device, which isn’t enabled by default.

    The ‘Out-of-Band AP Image Download’ feature allows access points (APs) to download OS images via HTTPS rather than over the CAPWAP protocol, allowing a more flexible and direct way to get firmware onto APs.

    That said, although it’s disabled by default, some large-scale or automated enterprise deployments may enable it for faster provisioning or recovery of APs.

    The following devices are vulnerable to attacks if the exploitation requirements are met:

    • Catalyst 9800-CL Wireless Controllers for Cloud
    • Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches
    • Catalyst 9800 Series Wireless Controllers
    • Embedded Wireless Controller on Catalyst APs

    On the other hand, products confirmed not to be impacted by the hard-coded JWT issue are: Cisco IOS (non-XE), Cisco IOS XR, Cisco Meraki products, Cisco NX-OS, and Cisco AireOS-based WLCs.

    Cisco has released security updates to address the critical vulnerability, so system administrators are advised to apply them as soon as possible.

    Users can determine the exact version that fixes the flaw for their device using the Cisco Software Checker for their specific device model.

    Although there are no mitigations or workarounds for CVE-2025-20188, disabling the ‘Out-of-Band AP Image Download’ feature is a solid defense.

    At this time, Cisco is unaware of any cases of active exploitation for CVE-2025-20188. However, given the severity of the issue, threat actors are likely to start scanning for exposed vulnerable endpoints immediately.

    Red Report 2025

    Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

    Attackers Cisco devices fixes flaw hijack IOS letting max severity
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    Previous ArticleSir Ian McGeechan: Former Scotland and British and Irish Lions head coach says he has prostate cancer
    Next Article Dumped cabinet minister Ed Husic promises ‘constructive’ backbench role after fiery attack on Marles | Australian politics
    [email protected]
    • Website

    Related Posts

    Ransomware gangs join ongoing SAP NetWeaver attacks

    May 15, 2025

    Meet your new colleague – the Machine Learning Admin • The Register

    May 15, 2025

    Die acht wichtigsten Sicherheitsmetriken

    May 15, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Posts

    BBC joins injured Gazan children as they arrive in Jordan

    Ransomware gangs join ongoing SAP NetWeaver attacks

    Even the Face of Georgia’s Medicaid Experiment Couldn’t Escape its Red Tape — ProPublica

    Meet your new colleague – the Machine Learning Admin • The Register

    Trending Posts

    BBC joins injured Gazan children as they arrive in Jordan

    May 15, 2025

    Ransomware gangs join ongoing SAP NetWeaver attacks

    May 15, 2025

    Even the Face of Georgia’s Medicaid Experiment Couldn’t Escape its Red Tape — ProPublica

    May 15, 2025

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    News

    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention

    Company

    • About Us
    • Disclaimer
    • Get In Touch
    • Privacy policy
    • Terms & Condition
    Recent Posts
    • BBC joins injured Gazan children as they arrive in Jordan
    • Ransomware gangs join ongoing SAP NetWeaver attacks

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 globalcrimedesk. Designed by Pro.
    Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

    Type above and press Enter to search. Press Esc to cancel.